Author Archives: thrivewpengine

Cloud Infrastructure is Inherently Redundant, is Your Server Room?

cloudAs we enter winter each year, it is an appropriate time to review what you will do under disaster type circumstances.  There are many things to consider when putting together a disaster plan, but one of the most basic IT requirements is power. Without power very few things can happen these days.  The reality is that your power will most likely go off at some point during the year for something other than being affected by a nor’easter.  If you were to be without power for seven to ten days because of fire at a power substation would that impact your business?  What about no power for 24 hours during your high season after a car strikes a telephone pole?  What if lightning struck your building and took out your main power panel? (more…)

The ‘Real’ Cloud Migration Journey Starts with Readiness

cloudThe Path to the Cloud – Where to Start?

As hybrid IT and multi-cloud strategies become more common, the need to manage cloud services and providers as a portfolio, rather than as stand-alone purchases, becomes obvious.  Organizations need to evaluate their cloud service as cross-functional efficiency investments with a holistic approach to risk mitigation and regulatory compliance. (more…)

Test Your Cyber Security Readiness

 

It was 2:30am one weekday night when my smoke alarms started going off at home. They are all connected together, so the whole house was a nice alarm bell. It was a weird fall night when it was warm outside and very foggy. We have had a lot of work done in the house, and I assumed it was a malfunction because of the dust that had been kicked up and the humidity outside. I disconnected the alarm that started this noise and got the family back into bed.  (more…)

On-premise Exchange vs. Office 365 – Are you ready to transition?

Cloud

In today’s cloud driven world, organizations are continually faced with the decision to keep their email solution in-house, or utilize a public cloud solution like Office 365. The standard for years has been an on-premise Microsoft Exchange server. This solution still works for many deployment scenarios, but moving your email and calendar solutions to Office 365 is a growing trend. In a recent study by Barracuda, over 63% of respondents indicated they are currently using Office 365.

(more…)

Virtualization Can Enhance Your Business’s Productivity

Virtualization has been rising in popularity during the past few years due to its ability to provide a viable solution for companies to increase productivity while reducing IT infrastructure costs.  By switching to virtualization, companies have been able to control workloads in data centers and reduce energy consumption for their environment.

Before we discuss the specific benefits of switching to virtualization let’s first define what virtualization is and some of the reasons why more companies are making the change.

(more…)

CIO Outlook Recognizes InfoHedge as Premier Service Provider

InfoHedge: The Revolutionary Investment Hosting Division for Thrive

Skill, luck and networking—elements that played a crucial role in a hedge fund manager. That was in the past. Fast forward to today, one more factor is quintessential, technology skills—because the introduction and proliferation of technology into the hedge fund space such as the usage of database and analysis platforms, websites, and teleconferencing among others, for the process of marketing, analyzing, and monitoring hedge funds has made the tasks more manageable. That being said, today’s hedge fund market success can be attributed primarily to higher volatility, the rally in energy prices, the influx of cryptocurrencies, and the continually advancing hedge funds technologies and the solution providers leveraging them, like New York-based InfoHedge Technologies. (more…)

When in Doubt, Throw it Out – Or Call and Confirm!

Are you aware that October is National Cybersecurity Awareness month?  With the day to day security headlines year-round you may be thinking to yourself “I am sick of hearing about security”.  As we come to the end of the month, bear with me for just a second as I let you in on a little security gem.  While there are many different security solutions that exist, some cheap and many expensive, yet arguably one of the most important ones is free.  It is a phrase coined by the National Cybersecurity Alliance, “When in Doubt, Throw It Out”.  When at home or work, if you receive a piece of physical junk mail that that claims you have one a free trip to the Moon, what do you do?  Most likely, you throw it out in the trash as you know it is not true. (more…)

Welcome to Cyber Security Month

Having a month dedicated to cyber security is a little bit of a misnomer. It indicates that there are some months where you don’t think about cyber security. Granted I think about security daily, as that is my job, but I hope most of you are also aware of it and think about it more than one month out of the year. However; since we do have a month dedicated to it, I thought this would be a good time to discuss some basic statistics provided in Verizon’s 2018 Data Breach Investigations Report. As the report says, “data breaches aren’t just a problem for security professionals”.

(more…)

Thrive Named to 2018 MSSP Alert Top 100 Managed Security Services Providers List

Second Annual List Honors Leading MSSPs & Cybersecurity Companies That Safegaurd Customers’ Digital Assets

MSSP Alert, published by After Nines Inc., has named Thrive 60th on the Top 100 MSSPs list for 2018. The list and research identify and honor the top 100 managed security services providers (MSSPs) that specialize in comprehensive, outsourced cybersecurity services.

The Top 100 MSSP rankings are based on MSSP Alert’s 2018 readership survey combined with aggregated third-party research. MSSPs featured throughout the list and research proactively monitor, manage and mitigate cyber threats for businesses, government agencies, educational institutions and nonprofit organizations of all sizes.

(more…)

The Low Hanging Fruit of Cyber Security Part 3 of 3: Security Awareness Training

Over the course of this three-part series, we have explored security measures to help keep your organization better protected from cyber criminals. In part one, we examined the importance of patching, and in part two,we explored advanced email security. In this final part of the series we will cover security awareness training that should be implemented in every business. (more…)